www.seclore.com Open in urlscan Pro
192.124.249.53  Public Scan

URL: https://www.seclore.com/blog/human-error-third-party-vendors-trouble/
Submission: On July 04 via manual from SG — Scanned from SG

Form analysis 1 forms found in the DOM

GET https://www.seclore.com/

<form class="jet-ajax-search__form" method="get" action="https://www.seclore.com/" role="search" target="">
  <div class="jet-ajax-search__fields-holder">
    <div class="jet-ajax-search__field-wrapper"> <label for="search-input-3a1f6fa" class="screen-reader-text">Search ...</label> <input id="search-input-3a1f6fa" class="jet-ajax-search__field" type="search" placeholder="Search ..." value="" name="s"
        autocomplete="off"> <input type="hidden"
        value="{&quot;search_source&quot;:[&quot;post&quot;,&quot;page&quot;],&quot;exclude_posts_ids&quot;:[&quot;45401&quot;,&quot;47090&quot;,&quot;49225&quot;],&quot;custom_fields_source&quot;:&quot;cta-link&quot;,&quot;results_order&quot;:&quot;desc&quot;}"
        name="jet_ajax_search_settings"> </div>
  </div> <button class="jet-ajax-search__submit" type="submit" aria-label="Search submit"><span class="jet-ajax-search__submit-icon jet-ajax-search-icon"><i aria-hidden="true" class="fas fa-search"></i></span></button>
</form>

Text Content

Skip to content
 * How to open a Seclore file
 * Careers
 * Customer Support

Site Search
 * Platform Close Platform Open Platform
 * Why Seclore Close Why Seclore Open Why Seclore
 * Partners Close Partners Open Partners
 * Learn Close Learn Open Learn
 * Company Close Company Open Company

DATA SECURITY SOLUTIONS


 * Risk Insights
 * Data Classification
 * Enterprise Digital Rights Management
 * Secure Email Encryption

INTEGRATIONS


 * Collaboration & Storage Systems

 * Microsoft 365
 * SharePoint
 * File Servers
 * Virtual Data Rooms or VDRs

 * DLP & CASB

 * Broadcom (Symantec)
 * Forcepoint
 * Skyhigh Security

 * Discovery & Classification

 * Spirion
 * Microsoft Sensitivity Labels

 * Identity SSO
 * APIs & SDKs
 * Professional Services

AVAILABLE FOR


 * Desktop

 * Mobile

 * Email

 * Cloud

PREVENT DATA THEFT


 * Third-Party Collaboration
 * Insider Threat Protection
 * Application Data Security
 * IP Protection

INDUSTRIES


 * Financial Services
 * Manufacturing

 * Semiconductor
 * Pharmaceuticals

ACHIEVE COMPLIANCE


 * GDPR Compliance
 * UAE Resolution
 * SDAIA Regulations
 * CCPA Compliance
 * RBI Guidelines

 * NYCRR Regulations
 * IRDAI Compliance
 * NIST Compliance
 * NCA Regulations
 * NIA Policy

 * ITAR Compliance
 * PCI-DSS Compliance
 * DPDP Compliance
 * GLBA Compliance

CUSTOMER STORIES



HOW SECLORE SECURELY MIGRATED MILLIONS OF DOCUMENTS


 * All Customer Stories

CHANNEL PARTNERS


 * Register a Deal
 * Lead Referral
 * Partner Portal Login
 * Become a Partner

REGISTER A DEAL

 * Resource Library
 * Blog

READ OUR BLOG POSTS

 * About
 * Careers
 * Leadership

 * Press
 * Contact Us
 * Customer Support

JOIN US

Get a Demo



SECLORED: THE DATA SECURITY NEWS BLOG

PrevPrevious
NextNext

Home » Human Error + Third-Party Vendors = Trouble


HUMAN ERROR + THIRD-PARTY VENDORS = TROUBLE

Category: Data Security, Third Party Risk


 * Jun 18, 2024


THIRD-PARTY VENDORS (LIKE SUPPLY CHAIN PARTNERS) SIGNIFICANTLY INCREASE YOUR
THREAT PROFILE.

When it comes to cybersecurity, business partners and third-party vendors
represent one of the MOST significant risks that organizations face, because
many entrust third parties with access to their most sensitive data and systems.
Companies and suppliers in industries like defense, financial services,
manufacturing, and healthcare also operate in highly regulated environments. For
those organizations, meeting stringent compliance requirements such as HIPAA,
SOX, GDPR, Personal Data Protection Bill, etc. are critical to business
operations. As a result, failure to implement the right compliance and
cybersecurity measures can put these companies at greater risk of serious harm.


HOW BIG IS THE PROBLEM?

According to IBM threat intelligence, the average cost of a data breach is $4.45
million, and “Manufacturing is the industry most commonly targeted by
cybercriminals.” Unfortunately, the true cost may be even greater because
breaches and leaks that result in sensitive data getting compromised can be
catastrophic, leading to lost credibility, disrupted supply chains, lost
revenue, and even impact national security.

Large companies rarely publish specifics about their supply chains, but a few
pioneering brands have outlined the scale of their supply chains. It’s also
apparent that in recent years, the number of supply chain partners for most
companies has exploded, mostly because of COVID-related supply chain issues:

 * Proctor and Gamble has more than 60,000 external business partners (EBPs)
 * Walmart over 100,000 suppliers
 * TotalEnergies buys from 100,000+ suppliers

NOW LET’S PUT THAT IN CONTEXT FOR THE AVERAGE LARGE ENTERPRISE THAT WE (SECLORE)
SEE EVERY DAY:

 * # of Employees: 10,000+
 * # of Suppliers/Vendors/External Business Partners: 5,000+
 * # of Sensitive emails/Documents shared: 1,200 daily (~300k/year)
 * # of mishandled documents: ~25 or 2% daily

Each of these suppliers represent a potential threat vector, exponentially
increasing the attack surface of the companies they supply. Add to that the
increasing number and sophistication of AI-powered cyberattacks and now we’ve
got some idea just how big this problem is.

AND IT’S NOT JUST US TALKING ABOUT THIS PROBLEM:

Our internal findings also align with what’s being reported externally by
government agencies and non-governmental organization (NGOs). For example, in
2020, the Royal Canadian Mounted Police (RCMP) reported that 38 agencies’
mishandling of data resulted in more than 5,000 incidents between Jan. 1 and
Dec. 10 in which classified, or otherwise protected documents were stored in a
manner that did not meet security requirements (or ~20 incidents every day).
These numbers look conservative when compared to the numbers reported by the US
Federal government. It’s been reported that over the last decade, millions of
emails intended for .mil (US military email addresses) were accidentally sent to
.ml addresses, the top-level domain (TLD) for the African nation of Mali. As a
result of this one-character typo, and sheer volume of emails sent… including
medical data, identification documents, maps of military installations, travel
itineraries, bookings for high-ranking military leaders, and more reached .ml
addresses rather than their intended .mil ones. While shocking, this all
represents how hard it is for organizations to anticipate every eventuality when
it comes to protecting their most sensitive data.

Given all this, it’s easy to see how your organization can quickly get out of
compliance, or worse, discover an active breach because sensitive data was
mishandled. Layer hacking, social engineering, and malware into the equation,
and it’s obvious that this is a real “Houston we have a problem” moment. Even
supply chains for single product lines can be complex. Seclore regularly sees
manufacturers expose sensitive data (intellectual property, strategies, pricing,
release plans, etc.) to thousands of ‘potential’ vendors as part of their
request for proposal (RFP) process, relying solely on Non-Disclosure Agreements
(NDAs) to keep this data safe.

Sadly, this complexity often hides the scale of the problem, which only comes to
light in times of crisis (data breach, pandemic, etc). So it’s no wonder that we
regularly see organizations in the news for getting hacked — despite their 3rd
party suppliers being the source of the data breach.


 “THEIR” WEAKEST LINK = “YOUR” WEAKEST LINK.

Most security researchers acknowledge that humans are the weakest and most
easily exploited link in an organization’s cybersecurity chain, and studies
confirm this, highlighting the fact that nine out of 10 (88%) of data breaches
are caused by employee mistakes. Worse, employees may be unwilling to admit
these mistakes if, for example, organizations penalize those mistakes too
severely.

But let’s put that aside for now, and assume that your internal cybersecurity
culture, training, and awareness is outstanding… how about your suppliers and
3rd party vendors? Now we’re getting to the heart of the problem. Even if you do
most (or all) the right things, your sensitive data is still at the mercy of
organizations that aren’t under your control, and whatever their cybersecurity
cultures are – unless you embrace a “data-centric” security approach.


BEST PRACTICES FOR PROTECTING SENSITIVE DATA SHARED WITH THIRD PARTIES:

I think we’ve clearly outlined the problem that organizations face to remain
competitive in the digital era. The question is, what can they do to improve
their security posture, particularly when data intentionally (or
unintentionally) leaves their controlled perimeter?  The following principles
are all inherent to “data-centric” security, and all of them are prerequisites
for achieving zero trust.

 * Assume that third-party networks are hostile: In the distant past, users
   could be relatively certain that known networks were secure, whereas zero
   trust assumes that any given network is insecure. Whether a network is secure
   or insecure, Seclore dynamically protects sensitive data at all times – at
   rest and in transit.
 * Acknowledge that internal and external threats are endemic: Traditional
   security methods assume networks are secure until a threat is detected.
   Data-centric security turns this model on its head. The goal is to flip the
   risk-reward ratio in favor of data owners. This means that control no longer
   equals access, and data-centric security measures like file-level encryption
   and access control place a tremendous burden on adversaries no matter how
   they acquire protected digital assets.
 * Authenticate and authorize every user and data flow: Data-centric security
   dynamically authorizes and authenticates users on a per-session and per-user
   basis, which makes it easier to enforce least-privileged access.
 * Dynamic Watermarking: Unlike static watermarks, a dynamic watermark is
   context-specific and can change after a publisher first applies it. Context
   can include anything from changes to the document or a user viewing it, to
   the date and time someone opens a file or email.
 * Continuously Assess Risk: Seclore helps organizations continuously assess the
   risks associated with business partners. While organizations should consider
   factors such as security, compliance and data handling practices when
   selecting partners, continuous monitoring means that organizations can
   promptly detect suspicious or unusual activity and potential security
   breaches.
 * Dynamic Access Control: Seclore lets you control who has access to your data,
   what they can do with it, and revoke that access at any time.
   * * Dynamically adjust usage-controls like the ability to print, download, or
       copy data
     * Grant access to third parties for a limited period of time, and revoke
       access when a project is finished, an employee is off-boarded, or
       sensitive data is accidentally shared with an unintended recipient.
     * As a last resort, revoke access to all emails/documents if a breach
       includes compromised identities, to limit the harm of that breach.
 * Dynamic Policy Adoption: Extend the value of your DLP/CASB solutions by
   leveraging existing classification policies to apply protection, rights
   management, and information/insights from Seclore. This full circle approach
   brings continuous improvement (CI) to your security posture so you can answer
   questions like:
   * * How long should saving data/files be available?
     * Should documents be editable or forwardable to additional recipients?
     * Should classified documents and emails be printable?
     * Should my company allow documents to be opened in any country?

Remember, while business partners can enhance your capabilities, they also
introduce risk. By following these best practices, you can minimize
vulnerabilities and build a more secure network of trust with your partners.
With an advanced solution like Seclore, your organization can reap the benefits
of data-centric security & compliance. By putting data first in your security
architecture, you can clearly understand what digital assets need to be
protected, where they reside, how sensitive they are, and effectively control
access to them.

Many organizations assume that ‘trusting’ their partners/suppliers is the only
path forward; however, this is a false choice. Seclore’s Data-Centric Security
platform eliminates over reliance on third-party vendors who might have a
radically different security posture than you do. By safeguarding the data
itself, rather than focusing primarily on securing networks or devices, Seclore
ensures that your most valuable digital assets remain secure regardless of where
they end up and how they got there. With Seclore, you get better knowledge,
control, and security for your sensitive data, ensuring that third-party vendors
don’t mishandle that data and make your company headline news.


Author ProfileRelated Posts

JUSTIN ENDRES



Justin Endres serves as the Chief Revenue Officer and brings two decades’
experience as a channel and sales leader for enterprise and cybersecurity
software companies. Prior to joining Seclore, Justin held various executive
roles at prominent cybersecurity companies, including SolarWinds, AlienVault
(acquired by AT&T), and Webroot (acquired by Carbonite). He's responsible for
driving revenue growth, expanding the company’s global market presence, and
deepening relationships with the channel.


 * Is Generative AI a CISO’s Worst Nightmare?
 * GLBA and Data-Centric Security for Financial Services



 * Tags:
 * data leakage, data security, data-centric security, human error, risk
   management, third-party risk

JUSTIN ENDRES

Justin Endres serves as the Chief Revenue Officer and brings two decades’
experience as a channel and sales leader for enterprise and cybersecurity
software companies. Prior to joining Seclore, Justin held various executive
roles at prominent cybersecurity companies, including SolarWinds, AlienVault
(acquired by AT&T), and Webroot (acquired by Carbonite). He's responsible for
driving revenue growth, expanding the company’s global market presence, and
deepening relationships with the channel.


RELATED POSTS


PROTECT YOUR SENSITIVE DATA BEFORE ADOPTING COPILOT FOR MICROSOFT 365

Jun 20, 2024

Adopting Copilot for Microsoft 365 may sound great in theory, but there are some
hidden security risks. While Microsoft has done a great job keeping security in
mind, data and information security teams need to be aware that Copilot
essentially has the keys to the castle — it can pull sensitive or proprietary
information from any file a user has access to. This presents a security risk
for most organizations, where it’s likely that users have overly broad access.

Read More


HUMAN ERROR + THIRD-PARTY VENDORS = TROUBLE

Jun 18, 2024

Third-party vendors (like supply chain partners) significantly increase your
threat profile. When

Read More


THE PITFALLS OF RELYING ON DATA LOSS PREVENTION ALONE

May 29, 2024

Data Loss Prevention (DLP) solutions are often the heroes of our data security
stories.

Read More


RELATED POSTS

SECURING DIGITAL ASSETS WITH DYNAMIC WATERMARKING: THE SECLORE ADVANTAGE

Securing sensitive information and preventing unauthorized distribution is a
constant challenge in the digital world. Decision-makers in large enterprises
need a robust data security technique that evolves and adapts to protect their
valuable digital assets. One innovative and increasingly popular solution is
dynamic watermarking.

BUSINESSES BEWARE: THE FIVE LEADING CAUSES OF DATA BREACHES

Data loss or data breach are two of the scariest words in modern information
security. Losing critical data can have reputational and monetary damage to
organizations of all sizes, including long-running negative press, as they work
to repair the issue that caused the breach.

IMPLEMENTING ZERO TRUST

There is now a need for a more rigorous approach towards data protection,
namely, the Zero Trust approach. Coined in 2010 by a Forrester expert, John
Kindervag, the Zero Trust approach operates on only one basic principle: Trust
No One.

5201 Great America Parkway Suite 440
Santa Clara, CA 95054

1-844-4-Seclore
1-844-473-2567

info@seclore.com

FOLLOW US

Facebook-f Linkedin Youtube
Contact Us

QUICK LINKS

Main Menu

 * Platform
 * Why Seclore
 * Partners
 * Customer Stories
 * Support

Main Menu

 * Resources
 * Company
 * Careers at Seclore – Create The Future of Data Security
 * Blog

© 2024 Seclore. All rights reserved.
Privacy statement | CSR Policy
We use cookies to deliver the best possible experience on our website. To learn
more, visit our Privacy Policy. By continuing to use this site, or closing this
box, you consent to our use of cookies.

Cookie settingsACCEPT

Manage consent
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these, the cookies that are categorized as necessary are
stored on your browser as they are essential for the working of basic
functionalities of the website. We also use third-party cookies that help us
analyze and understand how you use this website. These cookies will be stored in
your browser only with your consent. You also have the option to opt-out of
these cookies. But opting out of some of these cookies may affect your browsing
experience.
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
These cookies ensure basic functionalities and security features of the website,
anonymously.

CookieDurationDescriptionAWSALBCORS7 daysThis cookie is managed by Amazon Web
Services and is used for load balancing.connect.sid2 hoursThis cookie is used
for authentication and for secure log-in. It registers the log-in
information.cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR
Cookie Consent plugin. The cookie is used to store the user consent for the
cookies in the category "Analytics".cookielawinfo-checbox-functional11 monthsThe
cookie is set by GDPR cookie consent to record the user consent for the cookies
in the category "Functional".cookielawinfo-checbox-others11 monthsThis cookie is
set by GDPR Cookie Consent plugin. The cookie is used to store the user consent
for the cookies in the category "Other.cookielawinfo-checkbox-advertisement1
yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the
user consent for the cookies in the "Advertisement" category
.cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie
Consent plugin. The cookies is used to store the user consent for the cookies in
the category "Necessary".cookielawinfo-checkbox-performance11 monthsThis cookie
is set by GDPR Cookie Consent plugin. The cookie is used to store the user
consent for the cookies in the category "Performance".JSESSIONID6 hoursUsed by
sites written in JSP. General purpose platform session cookies that are used to
maintain users' state across page requests.viewed_cookie_policy11 monthsThe
cookie is set by the GDPR Cookie Consent plugin and is used to store whether or
not user has consented to the use of cookies. It does not store any personal
data.

Functional
Functional
Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.

CookieDurationDescription__cf_bm30 minutesThis cookie, set by Cloudflare, is
used to support Cloudflare Bot Management.bcookie2 yearsLinkedIn sets this
cookie from LinkedIn share buttons and ad tags to recognize browser
ID.langsessionThis cookie is used to store the language preferences of a user to
serve up content in that stored language the next time user visit the
website.lidc1 dayLinkedIn sets the lidc cookie to facilitate data center
selection.

Performance
Performance
Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.

CookieDurationDescriptionADRUM_BT1pastThis cookie is used to optimize the
visitor experience on the website by detecting errors on the website and share
the information to support staff.ADRUM_BTapastThis cookie is used to optimize
the visitor experience on the website by detecting errors on the website and
share the information to support staff.dtCookiesessionThis cookie is set by the
provider Dynatrace. This is a session cookie used to collect information for
Dynatrace. Its a system to track application performance and user errors.

Analytics
Analytics
Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.

CookieDurationDescription_ga2 yearsThe _ga cookie, installed by Google
Analytics, calculates visitor, session and campaign data and also keeps track of
site usage for the site's analytics report. The cookie stores information
anonymously and assigns a randomly generated number to recognize unique
visitors._gat_UA-60622713-11 minuteA variation of the _gat cookie set by Google
Analytics and Google Tag Manager to allow website owners to track visitor
behaviour and measure site performance. The pattern element in the name contains
the unique identity number of the account or website it relates to._gcl_au3
monthsProvided by Google Tag Manager to experiment advertisement efficiency of
websites using their services._gid1 dayInstalled by Google Analytics, _gid
cookie stores information on how visitors use a website, while also creating an
analytics report of the website's performance. Some of the data that are
collected include the number of visitors, their source, and the pages they visit
anonymously._uetsid1 dayThis cookies are used to collect analytical information
about how visitors use the website. This information is used to compile report
and improve site.CONSENT2 yearsYouTube sets this cookie via embedded
youtube-videos and registers anonymous statistical data.pardotpastThe pardot
cookie is set while the visitor is logged in as a Pardot user. The cookie
indicates an active session and is not used for tracking.

Advertisement
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and
marketing campaigns. These cookies track visitors across websites and collect
information to provide customized ads.

CookieDurationDescriptionbscookie2 yearsThis cookie is a browser ID cookie set
by Linked share Buttons and ad tags.IDE1 year 24 daysGoogle DoubleClick IDE
cookies are used to store information about how the user uses the website to
present them with relevant ads and according to the user profile.MUID1 year 24
daysBing sets this cookie to recognize unique web browsers visiting Microsoft
sites. This cookie is used for advertising, site analytics, and other
operations.test_cookie15 minutesThe test_cookie is set by doubleclick.net and is
used to determine if the user's browser supports cookies.VISITOR_INFO1_LIVE5
months 27 daysA cookie set by YouTube to measure bandwidth that determines
whether the user gets the new or old player interface.YSCsessionYSC cookie is
set by Youtube and is used to track the views of embedded videos on Youtube
pages.yt-remote-connected-devicesneverYouTube sets this cookie to store the
video preferences of the user using embedded YouTube
video.yt-remote-device-idneverYouTube sets this cookie to store the video
preferences of the user using embedded YouTube
video.yt.innertube::nextIdneverThis cookie, set by YouTube, registers a unique
ID to store data on what videos from YouTube the user has
seen.yt.innertube::requestsneverThis cookie, set by YouTube, registers a unique
ID to store data on what videos from YouTube the user has seen.

Others
Others
Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.

CookieDurationDescription_ce.cchsessionNo description_ce.s1 yearNo
description_uetvid1 year 24 daysNo description available.alr30 minutesNo
descriptionAnalyticsSyncHistory1 monthNo descriptionasst30 minutesNo description
available.AWSALB7 daysAWSALB is a cookie generated by the Application load
balancer in the Amazon Web Services. It works slightly different from
AWSELB.cass2 hoursNo description available.gdId10 yearsNo descriptiongdsid6
hoursNo descriptionGSESSIONID2 hoursNo description available.li_gc2 yearsNo
descriptionlpv32334130 minutesNo descriptionroute-gcrowd-fe-prodsessionNo
description available.SameSitepastNo description available.trs1 yearNo
description available.UserMatchHistory1 monthLinkedin - Used to track visitors
on multiple websites, in order to present relevant advertisement based on the
visitor's preferences.visitor_id3233411 year 9 months 10 daysNo
descriptionvisitor_id323341-hash1 year 9 months 10 daysNo descriptionvisitorId1
yearNo descriptionwidgetizedstickybar1 monthNo description available.

SAVE & ACCEPT
Powered by


Search ...
Results